Information security

View Practice Compliance by content type:

Latest Practice Compliance News

Featured Practice Compliance content

Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
9th Nov
Practice notes
Source of funds and wealth was a key focus of the SRA’s Preventing Money Laundering and Financing of Terrorism thematic review, published in March...
Read More >
9th Nov
Practice notes
This Practice Note provides an introduction to retained EU law, which is an entirely new legal concept introduced to UK domestic law in preparation...
Read More >
9th Nov
Precedents
DRAFTING FOR BREXIT: For the latest information on the impact of Brexit on the drafting, negotiation and enforceability of this Precedent, see...
Read More >
9th Nov
Precedents
How to use this testThese questions are designed to test your understanding after your attendance at our training on avoiding bribery and...
Read More >
9th Nov
Practice notes
The compliance officer for legal practice (COLP) sits at the heart of the firm's regulatory arrangements. This does not mean that the firm and its...
Read More >
9th Nov

Most recent Information security content

Practice notes
Information security has become a business-critical issue. It is not something you can tackle in isolation as there are obvious overlaps with cyber...
Read More >
5th May
Practice notes
Pandemics are exceptional events which present organisations with difficult business conditions, uncertainty and particularly challenging information...
Read More >
9th Apr
Practice notes
Encryption is a widely-available information security solution. It is relatively affordable and simple to implement, so is recommended by the...
Read More >
9th Apr
Practice notes
You must have appropriate security in place to prevent personal data being accidentally or deliberately compromised. Information security is wider...
Read More >
9th Apr
Precedents
1Introduction1.1We are committed to the highest standards of document and information management and security and treat confidentiality and data...
Read More >
29th Mar
Precedents
1Introduction1.1Maintaining business records in a systematic and reliable manner is essential to comply with our legal and regulatory requirements, eg...
Read More >
19th Mar
Practice notes
Information security comes with its own world of terminology and technology, which those sitting outside the tech world may struggle to understand....
Read More >
2nd Mar
Precedents
1Introduction1.1While remote working (whether at home or on the go) and removable media offer our business and clients great benefits, they can also...
Read More >
1st Mar
Practice notes
This document reflects the UK GDPR regime. References and links to the GDPR refer to the UK GDPR (Retained Regulation (EU) 2016/679) unless expressly...
Read More >
Produced in partnership with DG Legal 26th Feb
Practice notes
You must take appropriate technical and organisational measures against unauthorised or unlawful processing of, and accidental loss of or damage to,...
Read More >
Produced in partnership with DG Legal 26th Feb
Practice notes
This Practice Note is intended to help you:•identify the information and data that your firm holds and that your firm is responsible for (sometimes...
Read More >
Produced in partnership with DG Legal 26th Feb
Precedents
1Introduction1.1This strategy and plan builds on and supplements our other data management and security policies and procedures, namely...
Read More >
22nd Feb
Precedents
1Introduction1.1This Record retention schedule accompanies and is incorporated into [insert organisation’s name]’s Records management policy. It sets...
Read More >
16th Feb
Q&As
How are law firms vulnerable to attack?Cyber-attacks are indiscriminate, affecting both large and small firms. The primary risk is that information...
Read More >
15th Feb
Precedents
1Responsibility1.1[Insert name and/or job title eg, The Risk manager] is responsible for this policy.1.2They are responsible for communicating the...
Read More >
14th Feb
Precedents
This Precedent Data processing register will enable you to keep a record of the personal data you process and how it is protected. It is designed to...
Read More >
1st Feb
Q&As
Practice Notes: Information management and security—regulatory requirements—law firms and Information security—data protection compliance set out your...
Read More >
22nd Jan
Precedents
1Background informationAssessment for:[state whether the assessment relates to the whole firm or a specific department]Person conducting...
Read More >
22nd Jan
Q&As
What counts as confidential information?Confidential information is information that is (i) confidential in nature, and (ii) disclosed in...
Read More >
11th Jan
Precedents
This presentation has been designed as an aid to train your staff on your information management and security policy and procedures.The training...
Read More >
8th Jan

Popular documents